[Determine target system] The adversary must first determine the system they wish to modify the registry of. This needs to be a windows machine as this attack only works on the windows registry.
[Gain access to the system] The adversary needs to gain access to the system in some way so that they can modify the windows registry.
[Modify windows registry] The adversary will modify the windows registry by changing the configuration settings for a service. Specifically, the adversary will change the path settings to define a path to a malicious binary to be executed.
| Weakness Name | |
|---|---|
CWE-284 | 
                    Improper Access Control The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.  | 
                
| Name | Organization | Date | Date release | 
|---|---|---|---|
| CAPEC Content Team | The MITRE Corporation | 
| Name | Organization | Date | Comment | 
|---|---|---|---|
| CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
| CAPEC Content Team | The MITRE Corporation | Updated Taxonomy_Mappings | |
| CAPEC Content Team | The MITRE Corporation | Updated Description, Execution_Flow |